fkie_cve-2006-2449
Vulnerability from fkie_nvd
Published
2006-06-15 10:02
Modified
2024-11-21 00:11
Severity ?
Summary
KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
References
secalert@redhat.comhttp://secunia.com/advisories/20602Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20660Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20674Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20702Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20785Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20869Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/20890Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/21662Vendor Advisory
secalert@redhat.comhttp://securitytracker.com/id?1016297
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1156Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
secalert@redhat.comhttp://www.kde.org/info/security/advisory-20060614-1.txtVendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:105
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:106
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_39_kdm.htmlVendor Advisory
secalert@redhat.comhttp://www.osvdb.org/26511
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0548.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/437133/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/437322/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/18431
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/2355
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/27181
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
secalert@redhat.comhttps://usn.ubuntu.com/301-1/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20602Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20660Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20674Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20702Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20785Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20869Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20890Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21662Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016297
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1156Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kde.org/info/security/advisory-20060614-1.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:105
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:106
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_39_kdm.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26511
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0548.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437133/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/437322/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18431
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2355
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27181
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/301-1/
Impacted products
Vendor Product Version
kde kde 3.2
kde kde 3.2.1
kde kde 3.2.2
kde kde 3.2.3
kde kde 3.3
kde kde 3.3.1
kde kde 3.3.2
kde kde 3.4
kde kde 3.4.1
kde kde 3.4.2
kde kde 3.4.3
kde kde 3.5
kde kde 3.5.2
kde kde 3.5.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F69843-978D-4686-BC5B-1D09DA4A21BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACEE0AED-7918-41E9-A902-AC4070E03132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E19472-47B4-4398-A188-CA5A5D3E7060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17407A2-089E-43A5-9BD5-EFF966F5CC16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C4B436D-8D6A-473E-B707-26147208808B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E26B353-4985-4116-B97A-5767CDC732F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F7180B3-03AC-427C-8CAD-FE06F81C4FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "442021C9-BE4D-4BC9-8114-8BEFA9EC1232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7036AE90-C7E0-48CE-805D-3F1E04852675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D49AE92-BA00-4A8E-BBFE-1BE994CFA3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "29911CA1-ECFD-476F-8C85-EA0C6C143DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17CEFEB-9166-4426-92E1-D8F61D5F5D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C992C7-E81D-443B-ACE8-B92F8A36C1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:kde:kde:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EAC287B-1AB4-43F3-AC26-EDA689A004B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login."
    },
    {
      "lang": "es",
      "value": "KDE Display Manager (KDM) en KDE v3.2.0 a v3.5.3 permite a usuarios locales leer archivos de su elecci\u00f3n mediante un ataque de enlaces simb\u00f3licos relaciado con el tipo de sesi\u00f3n elegido en el inicio de sesi\u00f3n\r\n"
    }
  ],
  "evaluatorSolution": "Vendor links provide patches for each version affected.",
  "id": "CVE-2006-2449",
  "lastModified": "2024-11-21T00:11:20.697",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:H/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-15T10:02:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20602"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20660"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20674"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20702"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20785"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20869"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20890"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21662"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1016297"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.444467"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1156"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kde.org/info/security/advisory-20060614-1.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/26511"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0548.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/18431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/2355"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/301-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20702"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016297"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.444467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kde.org/info/security/advisory-20060614-1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0548.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/301-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.